EasyManua.ls Logo

Extreme Networks Summit WM3000 Series - Page 372

Extreme Networks Summit WM3000 Series
513 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Controller Security
Summit WM3000 Series Controller System Reference Guide372
6 If the properties of an existing policy are no longer relevant and cannot be edited to be useful, click
the Add button to define a new policy.
a Configure a set of attributes for the new IKE policy:
Sequence Number
Define the sequence number for the IKE policy. The available range is
from 1 to 10,000 with 1 being the highest priority value.
Encryption
Set the encryption method used to protect the data transmitted between
peers. Options include:
DES 56-bit DES-CBC
. The default value.
3DES
- 168-bit Triple DES.
AES
- 128-bit AES.
AES 192
- 192-bit AES.
AES 256
- 256-bit AES.
Hash Value
Define the hash algorithm used to ensure data integrity. The hash value
validates a packet comes from its intended source and has not been
modified in transit. Options include:
SHA
- The default value.
MD5
- MD5 has a smaller digest and is somewhat faster than SHA-1.
Authentication Type
Set the authentication scheme used to validate the identity of each peer.
Pre-shared keys do not scale accurately with a growing network but are
easier to maintain in a small network. Options include:
Pre-shared Key
- Uses pre-shared keys.
RSA Signature
- Uses a digital certificate with keys generated by the
RSA signatures algorithm.